Match Document Document Title
US20120002234 Approach For Securely Printing Electronic Documents  
An approach is provided for securely printing electronic documents using a portable media. The approach is applicable to a wide variety of contexts and implementations and includes secure direct...
US20110016328 INFORMATION INTERCHANGE SYSTEM AND APPARATUS  
To overcome the drawback of difficulties when interchanging a patient's health record among different health information management systems and yet keep the patient's privacy, this invention...
US20150178508 CONTROLLING AN ANALYSIS SYSTEM OF BIOLOGICAL SAMPLES  
A method for controlling an analysis system is presented. The method comprises receiving, by an encryption unit, authentication data of a user. In the case of a successful authentication, a...
US20130339745 CONTROLLING AN ANALYSIS SYSTEM OF BIOLOGICAL SAMPLES  
A method for controlling an analysis system is presented. The method comprises receiving, by an encryption unit, authentication data of a user. In the case of a successful authentication, a...
US20110276806 Creation and Delivery of Encrypted Virtual Disks  
The present application is directed to methods and systems for receiving a request for a virtual disk and creating a virtual disk that includes the virtual disk attributes identified in the...
US20110313836 CONTROLLING COUPON PRINTING TO MULTIPLE TYPES OF CLIENTS  
A coupon distributor controls coupon distribution via a centralized coupon distribution server. The server not only distributes coupons to the various computing devices, but also tracks the number...
US20150100793 Method of Improving FPGA Security Using Authorization Codes  
A method for securely programming a population of authorized FPGAs includes defining the population of authorized FPGAs, generating an encrypted configuration bitstream for the population of...
US20120317421 Fingerprinting Executable Code  
Executable code may be fingerprinted by inserting NOP codes into the executable code in a pattern that may reflect a fingerprint. The NOP codes may be single instructions or groups of instructions...
US20120254612 Privacy-Preserving Probabilistic Inference Based on Hidden Markov Models  
A probability of an observation sequence stored at a client is evaluated securely with respect to a hidden Markov model (HMM) stored at a server. The server determines, for each state of the HMM,...
US20140019768 System and Method for Shunting Alarms Using Identifying Tokens  
Alarms are shunted dependent on an authorized user's location being confirmed as in the vicinity of an unpowered token, such as an NFC chip, QR code or other 2D barcode. The tokens may be attached...
US20120260097 SYSTEM AND METHOD OF SIGNING A MESSAGE  
A system and method of signing a message to be sent from a first communication device to a destination via a second communication device. The message includes a first portion on the first...
US20140129838 METHOD AND APPARATUS FOR RESILIENT END-TO-END MESSAGE PROTECTION FOR LARGE-SCALE CYBER-PHYSICAL SYSTEM COMMUNICATIONS  
To address the security requirements for cyber-physical systems, embodiments of the present invention include a resilient end-to-end message protection framework, termed Resilient End-to End...
US20130346752 SECURE, AUDITABLE FILE EXCHANGE SYSTEM AND METHOD  
Secure and auditable file exchange between a professional and a client, patient, colleague, or other associate of the professional may be achieved via a file exchange service that automatically...
US20120047365 SECURE, AUDITABLE FILE EXCHANGE SYSTEM AND METHOD  
Secure and auditable file exchange between a professional and a client, patient, colleague, or other associate of the professional may be achieved via a file exchange service that automatically...
US20140359294 CONFIGURABLE, SECURE QUICK RESPONSE CODE CREATION AND USE  
Systems, software, and methods are provided for configurable, encrypted, secure QR code creation and use. Furthermore, these codes can be used by many entities to provide improved monitoring for a...
US20120017093 TRUSTWORTHY TIMESTAMPS AND CERTIFIABLE CLOCKS USING LOGS LINKED BY CRYPTOGRAPHIC HASHES  
A method and apparatus for creating and/or using trustworthy timestamps and certifiable clocks using logs linked by cryptographic hashes. In one embodiment, the method comprises maintaining a...
US20120324229 SYSTEM AND METHOD FOR GENERATING KEYLESS DIGITAL MULTI-SIGNATURES  
A method of generating a keyless digital multi-signature is provided. The method includes receiving multiple signature generation requests from one or more client computers, building subtrees...
US20110271100 UNATTENDED CODE UPDATE OF STORAGE FACILITY  
Various embodiments for providing an update to at least one storage facility in a computing storage environment are provided. In one embodiment, a security verification is performed on the update...
US20150256542 USER AUTHENTICATION  
Method and system for user authentication are described. The method comprises receiving an authentication code from an application server seeking authentication of the user. Further, a private key...
US20130173915 SYSTEM AND METHOD FOR SECURE NEWORK LOGIN  
Systems and methods for providing an expedited login process that is relatively fast and that still provides a reasonable level of security and a reasonable method for mitigating compromised login...
US20140173289 MOBILE IDENTITY PROVIDER WITH TWO FACTOR AUTHENTICATION  
An approach is provided for generating and decoding secure machine readable codes with a processor where the machine readable codes have multiple layers of security.
US20130042108 PRIVATE ACCESS TO HASH TABLES  
A server and a client mutually exclusively execute server-side and client-side commutative cryptographic processes and server-side and client-side commutative permutation processes. The server has...
US20150143128 METHOD AND DEVICE FOR PRODUCT AND DOCUMENT AUTHENTICATION  
Counterfeit articles are distinguished from genuine articles by a combination of a party-specific code and a product authentication code of the article. After authenticating a genuine article, a...
US20140025956 METHOD AND DEVICE FOR PRODUCT AND DOCUMENT AUTHENTICATION  
Counterfeit articles are distinguished from genuine articles by a combination of a party-specific code and a product authentication code of the article. After authenticating a genuine article, a...
US20140115323 SECURE SYSTEM FOR ALLOWING THE EXECUTION OF AUTHORIZED COMPUTER PROGRAM CODE  
Systems and methods for selective authorization of code modules are provided. According to one embodiment, a trusted service provider maintain a cloud-based whitelist containing cryptographic hash...
US20140195802 PAGE ENCRYPTION SYSTEM  
Text containing files are encrypted by first formatting the files for display. The display-formatted files are then coded to form files indicating the information. The files are encrypted. The...
US20140075203 METHOD FOR TESTING THE SECURITY OF AN ELECTRONIC DEVICE AGAINST AN ATTACK, AND ELECTRONIC DEVICE IMPLEMENTING COUNTERMEASURES  
A method of testing security of an electronic device against a combination of a side-channel attack and a fault-injection attack implemented during a method of cryptographic processing that...
US20120216050 MICROCODE AUTHENTICATION  
A microcode authentication unit provides access to a secure hardware unit. A microcode segment is provided to the microcode authentication unit, which generates a signature corresponding to the...
US20100218002 SECURING COMPUTER LOG FILES  
A log file is secured. One implementation involves maintaining a log file including one or more log entries in a storage device connected to a computer, and entering a new log entry by generating...
US20140245020 Verification System and Method with Extra Security for Lower-Entropy Input Records  
An authentication system for digital records has a hash tree structure that computes an uppermost, root hash value that may be digitally signed. A random or pseudo-random number is hashed together...
US20100332391 SECURE AUTHENTICATION BETWEEN MULTIPLE PARTIES  
Systems and methods are disclosed herein to allow a party to a multiple-party transaction to perform authentications using identification information received from another party while allowing the...
US20110022833 ALTERING PERFORMANCE OF COMPUTATIONAL UNITS HETEROGENEOUSLY ACCORDING TO PERFORMANCE SENSITIVITY  
One or more computational units of a computer system are selectively altered in terms of performance according to which of the one or more computational units has a higher performance sensitivity...
US20110066844 METHOD AND SYSTEM FOR DIGITAL RIGHTS MANAGEMENT BROKERING AND DIGITAL ASSET SECURITY TRANSCODING  
A computer-implemented method and system for DRM brokering and digital asset security transcoding comprising utilizing a broker for converting content from one format into one or more alternative...
US20150067322 SYSTEMS AND METHODS FOR MULTI-LEVEL TAGGING OF ENCRYPTED ITEMS FOR ADDITIONAL SECURITY AND EFFICIENT ENCRYPTED ITEM DETERMINATION  
The present disclosure is directed towards systems and methods for performing multi-level tagging of encrypted items for additional security and efficient encrypted item determination. A device...
US20120173870 Systems and Methods for Multi-Level Tagging of Encrypted Items for Additional Security and Efficient Encrypted Item Determination  
The present disclosure is directed towards systems and methods for performing multi-level tagging of encrypted items for additional security and efficient encrypted item determination. A device...
US20110071420 Physiological Parameter Measuring Platform Device Supporting Multiple Workflows  
A device obtains a series of measurements of a physiological parameter of a monitored patient when the device is operating within a monitoring workflow. The device displays a monitoring workflow...
US20140032932 METHOD, MANUFACTURE, AND APPARATUS FOR SECURE DEBUG AND CRASH LOGGING OF OBFUSCATED LIBRARIES  
A method, apparatus, and manufacture for debugging and crash logging is provided. A log file is received, where the log file includes encrypted log messages that indicate execution trace of...
US20130035955 Method and System to deliver state of the art concierge medical services to healh care consumers via a control center and a network of mobile medical platforms  
The method and system regard a medical concierge service combining a control center with a network of mobile medical platforms incorporating onsite and remote medical professionals, advanced...
US20130138951 METHOD AND DEVICE FOR AUTOMATICALLY DISTRIBUTING UPDATED KEY MATERIAL  
A method for handling an encrypted message received on an electronic device that has not been encrypted using a current public key. The portable electronic device automatically generates a reply...
US20120042166 METHOD AND DEVICE FOR AUTOMATICALLY DISTRIBUTING UPDATED KEY MATERIAL  
A method for handling an encrypted message received on an electronic device that has not been encrypted using a current public key. The portable electronic device automatically generates a reply...
US20150220746 ENCRYPTED DATA STORE FOR RECORDS  
A method performed by a processing system includes determining a location in a metadata tree of a patient for an electronic health record, generating a record key for the electronic health record...
US20130238891 Method and System for Encrypting Short Message  
The present invention discloses a method and system for implementing short message encryption. Both the Mobile Station (MS) and the Mobile Switching Center (MSC) are configured with...
US20120290848 Emulating Mixed-Code Programs Using a Virtual Machine Instance  
The subject disclosure is directed towards a technology for efficiently emulating program code that is protected by one or more various code virtualization techniques to detect the presence of...
US20140068255 METHOD OF MANAGING MEDICAL INFORMATION IN OPERATING SYSTEM FOR MEDICAL INFORMATION DATABASE  
Provided is a method of managing medical information in an operating system for a medical information database, the method including encrypting, by a first user, medical information having patient...
US20130275747 ENTERPRISE ENVIRONMENT DISK ENCRYPTION  
A method for deploying a disk encryption password to a client computer includes installing a disk encryption agent on a client computer, where the agent communicates with an enterprise encryption...
US20140013104 SYSTEMS AND METHODS FOR SECURELY SUBMITTING COMMENTS AMONG USERS VIA EXTERNAL MESSAGING APPLICATIONS IN A CLOUD-BASED PLATFORM  
Systems and methods are disclosed for facilitating secure commenting on content items among collaborators via external messaging applications in a collaborative cloud-based environment. In one...
US20120290844 SYSTEM AND METHOD FOR CONTROLLING MESSAGE ATTACHMENT HANDLING FUNCTIONS ON A MOBILE DEVICE  
A system and method for controlling message attachment handling functions on a mobile device is described herein. An attachment handling control can be set to identify one of a number of selected...
US20120297181 Persisting a Provisioned Machine on a Client Across Client Machine Reboot  
Systems and methods are provided for implementing a provisioned machine that persists across a client machine reboot. For example, a bootstrap function executing on a client machine may identify a...
US20120096211 PERFORMANCE AND POWER OPTIMIZED COMPUTER SYSTEM ARCHITECTURES AND METHODS LEVERAGING POWER OPTIMIZED TREE FABRIC INTERCONNECT  
A performance and power optimized computer system architecture and method leveraging power optimized tree fabric interconnect are disclosed. One embodiment builds low power server clusters...
US20150033046 METHOD OF POWER MANAGEMENT, PORTABLE SYSTEM AND PORTABLE POWER BANK  
A method of power management is to be implemented by a portable electronic device coupled to a portable power bank. The portable power bank is further coupled to an electrical appliance. In the...